Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2006-3287
Cisco Wireless Control System (WCS) for Linux and Windows 4.0(1) and earlier uses a default administrator username "root" and password "public," which allows remote attackers to gain access (aka bug CSCse21391).
Exploit prediction scoring system (EPSS) score
EPSS Score
0.013
EPSS Ranking
79.1%
CVSS Severity
CVSS v2 Score
7.5
References
http://secunia.com/advisories/20870
http://securitytracker.com/id?1016398
http://www.cisco.com/warp/public/707/cisco-sa-20060628-wcs.shtml
http://www.osvdb.org/26882
http://www.securityfocus.com/bid/18701
http://www.vupen.com/english/advisories/2006/2583
https://exchange.xforce.ibmcloud.com/vulnerabilities/27439
http://secunia.com/advisories/20870
http://securitytracker.com/id?1016398
http://www.cisco.com/warp/public/707/cisco-sa-20060628-wcs.shtml
http://www.osvdb.org/26882
http://www.securityfocus.com/bid/18701
http://www.vupen.com/english/advisories/2006/2583
https://exchange.xforce.ibmcloud.com/vulnerabilities/27439
Products affected by CVE-2006-3287
Cisco
»
Wireless Control System
»
Version:
N/A
cpe:2.3:h:cisco:wireless_control_system:-
Cisco
»
Wireless Control System
»
Version:
3.2(40)
cpe:2.3:h:cisco:wireless_control_system:3.2(40)
Cisco
»
Wireless Control System
»
Version:
3.2(51)
cpe:2.3:h:cisco:wireless_control_system:3.2(51)
Cisco
»
Wireless Control System
»
Version:
4.0
cpe:2.3:h:cisco:wireless_control_system:4.0
Cisco
»
Wireless Control System
»
Version:
4.0(1)
cpe:2.3:h:cisco:wireless_control_system:4.0(1)
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved